On July 23, software company Ivanti took proactive measures to protect its customers by releasing security patches for CVE-2023-35078, an alarming remote unauthenticated API access vulnerability discovered in Ivanti Endpoint Manager Mobile (EPMM), formerly known as MobileIron Core. This article delves into the specifics of the vulnerability, the steps taken by Ivanti to address it, and the importance of promptly installing the provided patches.
CVE-2023-35078 is an authentication bypass vulnerability that exists in Ivanti EPMM, which could potentially allow unauthorized users to access restricted functionality or resources within the application without the need for proper authentication. The severity of this vulnerability lies in the fact that attackers can exploit it remotely and without user interaction, making it highly concerning for internet-exposed systems.
Ivanti responded swiftly to the discovery of the vulnerability, recognizing the potential risks it poses to its customers’ security. The company released security patches that address the issue for three EPMM versions: 18.104.22.168, 22.214.171.124, and 126.96.36.199. Security experts strongly advise users to install these patches as soon as possible to safeguard their systems from potential exploitation.